Static task
static1
Behavioral task
behavioral1
Sample
529ed4e32df0d3918d0000f5e3d814fffabae85b85139a2a575f4440fdab62a5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
529ed4e32df0d3918d0000f5e3d814fffabae85b85139a2a575f4440fdab62a5.exe
Resource
win10v2004-20240802-en
General
-
Target
529ed4e32df0d3918d0000f5e3d814fffabae85b85139a2a575f4440fdab62a5.exe
-
Size
23.3MB
-
MD5
faae11e2a4c32aa69469d6a57550828b
-
SHA1
4a51a4b6e2d5acd48afb37b41c20d7f4bbc99a3e
-
SHA256
529ed4e32df0d3918d0000f5e3d814fffabae85b85139a2a575f4440fdab62a5
-
SHA512
b2ef1ba64012c9a683e92c3322c090aeb3d91d1fccabd9a4fb21de01cca8386f03cdbd38ab9aca219b3df94914644c7e29c476ea85ff082d606c7742c671e3ae
-
SSDEEP
393216:lwvupajav/FEj/zZ36WJpMmfqRMClolYWpH8onZSdZ1xqgj75Rn+OD7nj78uYRX7:CvbtKaUB0H5B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 529ed4e32df0d3918d0000f5e3d814fffabae85b85139a2a575f4440fdab62a5.exe
Files
-
529ed4e32df0d3918d0000f5e3d814fffabae85b85139a2a575f4440fdab62a5.exe.exe windows:5 windows x64 arch:x64
bb0f436b629637f503454a60a1d186eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
Process32FirstW
Sleep
CreateToolhelp32Snapshot
CloseHandle
WaitForSingleObject
Process32NextW
GetFileAttributesW
GetCurrentProcess
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
WideCharToMultiByte
GetCommandLineW
GetStartupInfoW
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
LCMapStringW
MultiByteToWideChar
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FlsAlloc
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
TerminateProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
FatalAppExitA
WriteFile
GetModuleFileNameW
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
SetStdHandle
GetProcessHeap
advapi32
RegOpenKeyExW
RegCloseKey
shell32
SHGetKnownFolderPath
urlmon
URLDownloadToFileA
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23.1MB - Virtual size: 23.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ